Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
-
Size
280KB
-
MD5
5e7080ef6f95218618250291824c02d7
-
SHA1
1d08b94efe4ad5fca6f60f7d1c4f6312365d0b4b
-
SHA256
39655f6b003a6f5ef02b4ed8878f79f623d4d38b7832fa18f6b2e4e2d2232222
-
SHA512
394c23f48bf09e07caa808f8457319148f848b8df16b7657340b8313b9bd858e7d2f53a2bb0c2712afce9b8a19f7e472c72cddfeaf1d7f725bbc127cf8775a5a
-
SSDEEP
6144:3Yc2uFGmzyW2ckd91ylUWCLH07TdDMmqxlGTyY2VBP478rhbm:3YcrFG7GljC707TBkx8Tv2/478I
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
resource yara_rule behavioral1/memory/1680-2-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar6 -
Tries to connect to .bazar domain 13 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 20 vacationinsydney2021.bazar 25 bestsightsofwildaustralia.bazar 27 erùqavyr.bazar 28 ywzvavex.bazar 43 ewzvygex.bazar 42 yze8wyso.bazar 44 yzœþavex.bazar 21 vacationinsydney2021.bazar 22 vacationinsydney2021.bazar 26 sydneynewtours.bazar 39 yz8ygso.bazar 40 vi¡fwyex.bazar 41 ewñuekso.bazar -
Unexpected DNS network traffic destination 13 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 195.10.195.195 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 94.247.43.254 Destination IP 65.21.1.106 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
description flow ioc HTTP URL 15 https://api.opennicproject.org/geoip/?bare&ipv=4&wl=all&res=8 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe"1⤵
- Modifies system certificate store
PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exeC:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe 3267170951⤵PID:2360